Remove Data Remove Risk Management Remove White Paper
article thumbnail

Mobile Security – A Requirement for National Security (E166)

FedInsider

This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. We explore websites that are designed to fool the end users into believing they are on a secure platform.

article thumbnail

Facing the Challenges Artificial Intelligence Poses

FedInsider

What agencies are looking for is help addressing their boots-on-the-ground challenges, such as the lack of specialized talent, where they should invest their limited R&D funds, meeting the lofty standards of the AI bill of rights – or even how their own data assets are gathered, organized, and used in AI applications.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement. Army War College.

article thumbnail

Pentagon IG not impressed by effectiveness of DoD vendors’ award fees

Federal News Network

Auditors said without solid data, it’s hard to determine whether those award fees do much good. ( White papers are due by March 7, and winners will be announced on August 23. This month, CISA extended the charter through 2026 for the Information and Communications Technology Supply Chain Risk Management Task Force.

article thumbnail

Using the Tools at Hand to Get to Zero Trust

FedInsider

Additionally, Mark helps clients understand where to start with zero trust and how to utilize security program management and security risk management to ensure continued success in the implementation of Zero Trust concepts.

article thumbnail

Are you ready to be the manufacturer of the future?

ivalua

The world of manufacturing is quickly evolving, driven by production modernization, materials innovation, big data, and a new type of workforce. Improving sourcing cycle time is critical, as is having the right information in place to navigate around roadblocks and mitigate risk. It’s time to add some data experts to your teams.

article thumbnail

Bringing Agility to the Modern Security Operations Center (E132)

FedInsider

Robert Roser Chief Information Security Officer Robert “Rob” Roser is a particle physicist and currently serves as Idaho National Laboratory’s (INL) Chief Information Security Officer as well as Director for Cybersecurity and Chief Data Officer. He joined INL four years go.